Bimonthly    Since 1986
ISSN 1000-9000(Print)
CN 11-2296/TP
Indexed in:
Publication Details
Edited by: Editorial Board of Journal Of Computer Science and Technology
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Distributed by:
China: All Local Post Offices
Other Countries: Springer
  • Table of Content
      10 July 1987, Volume 2 Issue 3 Previous Issue    Next Issue
    For Selected: View Abstracts Toggle Thumbnails
    Design of Array Processor Systems
    Xia Peisu; Fang Xinwo; Wang Yuxiang; Yan Kaiming; Zhang Tingjun; Liu Yulan; Zhao Chunying; Sun Jizhong;
    Journal of Computer Science and Technology, 1987, 2 (3): 163-173. 
    Abstract   PDF(234KB) ( 1372 )   Chinese Summary
    A new type of high performance array processor system is presented in this paper.Unlike the conventional host-peripheral array processor systems,this system is designed with a functionally distributed approach.The design philosophy is described first.Then the hardware organizations of two concrete systems,namely:150-AP and GF-10/12,including the communication between processors are shown.Some attractive system performances for users programs are also given.
    References | Related Articles | Metrics
    An Efficient Parallel Algorithm for FFT
    Qiao Xiangzhen;
    Journal of Computer Science and Technology, 1987, 2 (3): 174-190. 
    Abstract   PDF(744KB) ( 1232 )   Chinese Summary
    A new parallel processing system has been proposed.It is designed to perform parallel vector operations at maximum efficiency.In addition,it can also handle communicating vector operations,and hence exploit irregular parallelism present in many apparently sequential algorithms.The novel features of this architecture offer a new kind of multi-processor facility which combines some of the advantages of an array processor with those of a vector processor. The system is therefore suitable for a wide range of al…
    References | Related Articles | Metrics
    Termination Preserving Problem in the Transformation of Applicative Programs
    Sun Yongqiang; Lu Ruzhan; Huang Xiaorong;
    Journal of Computer Science and Technology, 1987, 2 (3): 191-201. 
    Abstract   PDF(311KB) ( 1211 )   Chinese Summary
    Program transformation is a promising area of software methodology.The Folding/Unfolding method proposed by Burstall/Darlington is a simple and powerful transformation method for applicative programs.The only operations used are folding and unfolding of function definitions and substitution using laws.The major drawback of this method is that only partial correctness of functions is preserved and termination may be lost. That is if function f_1 is transformed to f_n,the computation of f_n on an object x wil…
    References | Related Articles | Metrics
    Some Mathematical Properties of the Functional Programming Language FP
    Zhu Hong;
    Journal of Computer Science and Technology, 1987, 2 (3): 202-216. 
    Abstract   PDF(645KB) ( 1208 )   Chinese Summary
    This paper will introduce the function systems approach to study the mathematical properties of Backus functional programming language FP.Here,a function system is defined as a set of functions o FP.In the paper,we define the notions of complete,orthogonal and orthonormal systems,and prove their principal properties.These properties are used in the discussion of the completeness of FP program algebra and properties of the expansion of program in orthogonal systems.
    References | Related Articles | Metrics
    On Interrupt Strategy from the Point of View of System Efficiency
    Chen Shicheng; Zhou Zhongyi;
    Journal of Computer Science and Technology, 1987, 2 (3): 217-225. 
    Abstract   PDF(185KB) ( 1265 )   Chinese Summary
    Interrupt strategy of an operating system can help computer to tackle with urgent or important events,and to run programs in a reasonable fashion in order to achieve a satisfactory performance.But a sophisticated strategy will cause an amount of system costs.In this paper we introduce the concept of “layered interrupt priorities”which will care both the system costs and the response capability.This strategy can be applied in timesharing systems,realtime systems,or multiprocessor systems.At the end of the pa…
    References | Related Articles | Metrics
    CAD System of Microprogrammed Digital Systems
    Li Minghui;
    Journal of Computer Science and Technology, 1987, 2 (3): 226-235. 
    Abstract   PDF(490KB) ( 1020 )   Chinese Summary
    This paper describes the Computer Aided Design System of Microprogrammed Digital Systems (CADSMDS).CADSMDS consists of three subsystems:Register Transfer Level Description Language (RTLDL),General Micro Code Generation System(GMCGS)and General Microprogram Simulation System(GMSS).This system could be used for the generation of microcode,specification and design of hardware system,and simulation and verification of microarchitecture and micro code.It is an automatic development and design tool for microprogr…
    References | Related Articles | Metrics
    A Key-Lock Access Control
    Huang Guoxiang; Liu Jian;
    Journal of Computer Science and Technology, 1987, 2 (3): 236-243. 
    Abstract   PDF(212KB) ( 1179 )   Chinese Summary
    Access control is one of the serious problems in modern information systems.In this paper we suggest a key-lock strategy to represent the privilege relationship involving linear transformations and nonlinear constraints.The implementation shows that this strategy has got the properties of security,and information hidden,and satisfies the least privilege principle, This distributed management of sensitive data adapts the distributed systems well.
    References | Related Articles | Metrics
  Journal Online
Just Accepted
Top Cited Papers
Top 30 Most Read
Paper Lists of Areas
Special Issues
   ScholarOne Manuscripts
   Log In

User ID:


  Forgot your password?

Enter your e-mail address to receive your account information.

ISSN 1000-9000(Print)

CN 11-2296/TP

Editorial Board
Author Guidelines
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
E-mail: jcst@ict.ac.cn
  Copyright ©2015 JCST, All Rights Reserved